RHSA-2026:1942
Vulnerability from csaf_redhat - Published: 2026-02-04 15:43 - Updated: 2026-02-12 05:10Summary
Red Hat Security Advisory: Red Hat Quay 3.15.3
Notes
Topic
Red Hat Quay 3.15.3 is now available with bug fixes.
Details
Quay 3.15.3
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.15.3 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.15.3",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:1942",
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47907",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_1942.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.15.3",
"tracking": {
"current_release_date": "2026-02-12T05:10:12+00:00",
"generator": {
"date": "2026-02-12T05:10:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:1942",
"initial_release_date": "2026-02-04T15:43:51+00:00",
"revision_history": [
{
"date": "2026-02-04T15:43:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-04T15:44:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-12T05:10:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.15",
"product": {
"name": "Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.15::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3A1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770135404"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3A547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770135436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Ab33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146612"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Ae657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Ac0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3A197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770149618"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3Ae51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Aa8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Afb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134320"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Af57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134351"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146190"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134397"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770134436"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1770146565"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64 as a component of Red Hat Quay 3.15",
"product_id": "Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64",
"relates_to_product_reference": "Red Hat Quay 3.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-47907",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2025-08-07T16:01:06.247481+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2387083"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in database/sql. Concurrent queries can produce unexpected results when a query is cancelled during a Scan method call on returned Rows, creating a race condition. This vulnerability allows an attacker who can initiate and cancel queries to trigger this condition, possibly leading to inconsistent data being returned to the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "database/sql: Postgres Scan Race Condition",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Moderate severity issues rather than Important. The os/exec LookPath flaw requires a misconfigured PATH to be exploitable, and the database/sql race condition primarily impacts applications that cancel queries while running multiple queries concurrently. Both can cause unexpected behavior, but the exploitation scope is limited and unlikely to result in direct compromise in most typical deployments.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47907"
},
{
"category": "external",
"summary": "RHBZ#2387083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387083"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47907"
},
{
"category": "external",
"summary": "https://go.dev/cl/693735",
"url": "https://go.dev/cl/693735"
},
{
"category": "external",
"summary": "https://go.dev/issue/74831",
"url": "https://go.dev/issue/74831"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM",
"url": "https://groups.google.com/g/golang-announce/c/x5MKroML2yM"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3849",
"url": "https://pkg.go.dev/vuln/GO-2025-3849"
}
],
"release_date": "2025-08-07T15:25:30.704000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "database/sql: Postgres Scan Race Condition"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "Axios is a promise based HTTP client for the browser and Node.js. When Axios starting in version 0.28.0 and prior to versions 0.30.2 and 1.12.0 runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested `responseType: \u0027stream\u0027`. Versions 0.30.2 and 1.12.0 contain a patch for the issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.4, Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation. This issue has been patched in version 1.6.4.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"known_not_affected": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-04T15:43:51+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:1942"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:59059b547d81061afa5296c9108100ad0a3b38204c369518079547f53f9fde39_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:c0c2597d756a64d1c337e4b1363237c0d0f0d51a3a4a7e66869d9de8fc107f5c_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/clair-rhel8@sha256:fb914c779ffbacc700738d66a879265eb16f00b93992df9110098fad1260c3ad_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:547045f7298b7f61aadb4078a7f98f09de79ea9a96d15334fb3dced867363799_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:08d2fa1fec592fa0e8adf5f32ea89bfcfef66b9d62fb16c059e0dfa7e30a67cf_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:6549757fb3ab0a938995dee5a585ebea1b993b7a7acec3967814bc4edfe88dc9_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:f57d155305428d13516b9952c61a2c0161dca997f6d68f1fb07ed974c5b24e93_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:b33074468241b49cd55e104ace159501e5a9c85915e98db7d76414cacc0f9133_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:6cb7b946dc37ba1e17390da5d787cfd13df6060ea0ccf3aef848167069b5771d_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:71bb6e12ef5476df69c02f38d332ff93edec5652c70168250509afa366d35709_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-builder-rhel8@sha256:e657fb1bc3ac18d81475cec98ff2ebaf18c430f580706f8193ccf43cfcba9b32_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:1b029e5ea06245afa565ba026f0aa47e561b2c6d369f466ec445a16f6dbe0c23_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:313b6e898b506c035dbbe58d8b6ef295f4026e9f204983eb72e9e3a63bcefdf0_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:6b206358b8b431d0e40ad8cfec4deb98eb65ce154a2975605a7afaaace1ad007_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:8b26439b146800cd82f1a83e0d663bbc39cc7fbfc6ed6ce5be8ae0f63abc254a_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-bundle@sha256:197ae6472f0a4fcb33363ed461ea9f465eeff043d88c9d2e27f419f3e68a1a7d_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:50859e911d5bba00742d36bccad895d8951a61cb6d94eccc02c68a6bf760e93c_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:6143158e553f1f0284ec0b41932a03e8aa0c276b54f5bdf9f6bc9c7104215801_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-operator-rhel8@sha256:e51928f87c59cf9226f0debfc91d09683a94a829af498b917d6687fc67f7a916_amd64",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:08a827d542790820a10a61bacdc8ab7c05a6fdd476f1224ed76f20d65e93673f_s390x",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:7bfb851938e312f47598891ba9f0d7b17e6657090e0204d37d5676313b33f134_ppc64le",
"Red Hat Quay 3.15:registry.redhat.io/quay/quay-rhel8@sha256:a8daa359ab7a0bc9722b25fb87aa6fd253506632640bfe7f31c9c92868421ecb_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…